Case Study Description - Payment Time Case Study
Major consulting firms such as Accenture, Ernst & Young Consulting, and Deloitte & Touche Consulting employ statistical analysis to assess the effectiveness of the systems they design for their customers. In this case, a consulting firm has developed an electronic billing system for a Stockton, CA, trucking company. The system sends invoices electronically to each customer’s computer and allows customers to easily check and correct errors. It is hoped the new billing system will substantially reduce the amount of time it takes customers to make payments. Typical payment times—measured from the date on an invoice to the date payment is received—using the trucking company’s old billing system had been 39 days or more. This exceeded the industry standard payment time of 30 days.
The new billing system does not automatically compute the payment time for each invoice because there is no continuing need for this information. The management consulting firm believes the new system will reduce the mean bill payment time by more than 50 percent. The mean payment time using the old billing system was approximately equal to, but no less than, 39 days. Therefore, if µ denotes the new mean payment time, the consulting firm believes that µ will be less than 19.5 days. Therefore, to assess the system’s effectiveness (whether µ < 19.5 days), the consulting firm selects a random sample of 65 invoices from the 7,823 invoices processed during the first three months of the new system’s operation. Whereas this is the first time the consulting company has installed an electronic billing system in a trucking company, the firm has installed electronic billing systems in other types of companies.
Analysis of results from these other companies show, although the population mean payment time varies from company to company, the population standard deviation of payment times is the same for different companies and equals 4.2 days. The payment times for the 65 sample invoices have been taken and the sample mean has been calculated to be 18.10 days. If this sample can be used to establish that new billing system substantially reduces payment times, the consulting firm plans to market the system to other trucking firms.
Develop a 600-word Microsoft Word report including the following calculations and using the information to determine whether the new billing system has reduced the mean bill payment time:
In: Statistics and Probability
Rio’s [Rio Tino Ltd] latest climate change report, released in February, says that it has modelled the likely performance of its assets at a range of carbon prices, including the global $US120-a-tonne equivalent that experts say are probably necessary to keep global warming to less than 1.5C.
Rio concedes such a price, combined with other carbon abatement measures, would cut margins at its dominant iron ore division, which delivered $US17bn in underlying earnings in 2019, and threaten the viability of its two Australian aluminium smelters powered by fossil fuels.
“The potential downsides to iron ore revenues from a greater use of scrap across the steel value chain are expected to be offset by upsides for aluminium and copper — which are both essential for the electrification of the global energy system, including electric vehicles, and the deployment of low-carbon power solutions such as solar and wind,” Rio said.
“Importantly, the competitive position of our assets, both on industry cash cost and carbon intensity curves, is expected to protect the margins of our assets, even for commodities such as iron ore where we may face a negative impact on demand and price. In the case of aluminium, the attractiveness of our hydro-based assets is expected to increase relative to coal-based smelters, which would face increased carbon costs that may result in higher aluminium prices.”
Rio has said a carbon price is an “indispensable” part of any strategy to combat climate change.
It says its greatest fear about the move to a carbon price as a means of combating climate change, however, was that the same price would not be applied by all global governments, putting some of its assets at a competitive disadvantage against producers in other jurisdictions.
While Rio has set a goal of reducing its own carbon emissions by 15 per cent by 2030, from 2018 levels, it has so far resisted pressure to follow the lead of rivals such as BHP and Vale and set goals for the reduction of so- called scope 3 emissions — those attributable to customers that buy it products, rather than its own operations.
On Thursday Rio’s resistance was met with a strong backlash from institutional investors, with almost 37 per cent of votes at its annual shareholder meeting on Thursday backing a resolution calling on the company to match the promises made by its major competitors.
Extract from Evans, N. Rio Tinto chairman Simon Thompson linked to carbon price pledge. The Australian. 8 May 2020.
Required:
a) From the content above, explain fully what theories from
ACC30008 can be used to explain:
i. Rio’s response to the prospect of a price on carbon (maximum
word limit 500 words) ( 8 marks)
ii. TheresponsefromRio’sinstitutionalinvestors?(Maximumwordlimit500words) (8marks) b) What is the meaning of the term ‘underlying earnings’ used by Rio Tinto Ltd in explaining the impact
on its iron ore division of putting a price on carbon? (maximum word limit 250 words)
In: Accounting
are provided with the unadjusted trial balance (Microsoft® Excel) and your manager’s meeting notes and questions (Microsoft® Word) for your new tax client – Phoenix Medical. 2. Following the notes, modify the unadjusted trial balance to generate a trial balance workpaper (in Microsoft® Excel) that includes: a. Adjusting Journal Entries b. Adjusted Book Income c. Tax Journal Entries d. Taxable Income e. Answers to your manager’s questions (Microsoft® Word or Excel). 3. The client depends on you, the CPA, to provide journal entries for activity in fixed assets. While discussing fixed assets, the client divulges that he got a great deal to upgrade his laser dermatology equipment. Ultimately, you find out that $569,888 of new equipment was purchased and placed in service on 6/18/2015. 4. Furthermore, and much after the fact, you discover that old medical equipment was sold to an unrelated party for $75,000 cash. The original cost of the equipment was $300,000 and it was fully depreciated (no Sec. 179). The cash was deposited in one of the shareholders personal accounts. a. Provide a journal entry to calculate the gain on sale and adjust the fixed asset and accumulated depreciation accounts. b. What is the nature of this gain? The nature of this gain is going to be long term since it is over more than one year. c. Could the Dr. have structured this sale in a different way to avoid taxable income? How? Yes only if the equiptment was gifted to a spouce then there would not have been any income tax. 5. The client depends on his accountant to provide a journal entry for the annual depreciation expense. They have adopted a policy of treating book depreciation equal to tax depreciation. Depreciation expense for the year will include: a. Depreciation on assets placed in service prior to 2015 is: $86,769 b. Maximize Sec. 179 expense on assets placed in service in 2015. c. Take Sec. 168(k) – 50% Bonus – on new equipment if applicable.
Week 3 Determine Taxable Income: 1. Determine taxable income. Show all adjustments in the Microsoft® Excel spreadsheet. Footnote references are provided to assist you. 2. The Dr. has filed his prior tax returns on the cash basis. a. What questions will you ask to be sure he can continue to file on the cash basis? 3. You find that in 2015, the Dr. qualifies, and choose to file on the cash basis. His books are kept on the accrual basis. Determine the adjustments needed. 4. No federal taxes were paid in 2014, and no estimated taxes were paid in 2015. 5. Within the state tax expense, you find $4,389 is late payment penalties. 6. While analyzing the financial information, you find that hidden in “Accounts Payable” is $28,953 of accrued salaries. You also find that the salaries were paid in the first week of February. a. Does this have an impact on taxable income? 7. Determine the accrual to cash adjustments for accounts receivable and accounts payable. a. A charitable contribution carryforward of $40,000 is available. b. Included in insurance expense is $12,523 of officers’ life insurance. You determine the company is the beneficiary, and each officer is a greater than 20% shareholder
In: Accounting
In: Operations Management
XML and JAVA
Write a Java program that meets these requirements. It is important you follow these requirements closely.
• Create a NetBeans project named LastnameAssign1. Change Lastname to your last name. For example, my project would be named NicholsonAssign1.
• In the Java file, print a welcome message that includes your full name.
• The program should prompt for an XML filename to write to o The filename entered must end with .xml and have at least one letter before the period. If it does not, print a warning and prompt again. Keep nagging the user until a proper file name is entered.
• Prompt the user for 3 integers.
o The three integers represent red, blue, and green channel values for a color. o Process the numbers according to the instructions below
o Once you have handled the 3 input values, prompt the user again o Keep prompting the user for 3 integers until the user enters the single word DONE
o Reading input should not stop for any reason except for when the user enters DONE.
o The user will not mix DONE and the numbers. The user will either enter 3 integers OR the word DONE
• Once the user is done, open the filename entered in the first step and output the data.
o If no numbers were entered, then do not open the file for writing. Simply print a message that no data was entered.
o When 1 or more colors are entered, write out the XML data for each color. See below for the format.
o Sometimes users may enter integer values that are larger than 255 or less than 0. Values like this will need to be “clipped”, that is, converted to good values. For example, if the user enters 300 for red, then the actual red channel value will be 255. If the user entered -10 for the blue channel, then the actual blue channel value will be 0.
You should follow the sample below and your program should
exhibit the same behavior. For full credit, your generated XML
files must pass validation with NetBeans Check XML.
GENERAL REQUIREMENTS
All Java-related assignments will have the requirements below. While you may find them limiting, their purpose is to help you adopt good programming habits.
1. You should not have one, ginormous main() function. Your program should be modular, that is, define several (more than 2) meaningful functions in addition to main().
2. All functions should have a comment describing their purpose.
3. You may not use the System.exit() function
4. You must include a comment at the top of your .java file in this
format:
/*******************
John Nicholson
CSCI 3020 Section 04
Fall 2019
Assignment 1
This program does ...
*******************/
You should obviously change the name to your name, the section to
your section, and write a real description of the program. If this
comment is missing, you will automatically lose 50% of the points
on the assignment. Your assignment will not be regraded if you do
not put in the correct comment.
XML
In: Computer Science
Assignment: Square Matrix ("Caesar Block")Cipher
C++ ASSIGNMENTS
*REMEMBER IT SHOULD NOT ONLY READ ONE LINE OR A SINGLE WORD
remember, read, understand, and use the waterpump.cpp program
will process an arbitrary amount of input text, however long.
Arrange a stream in a two dimensional array of characters by filling up
the array a line at a time, from leftmost column to rightmost column.
DO NOT USE A GETLINE: this program should be able to input an entire library,
not a single line or word. Remember: we're building tools real people
would use for real tasks. Remember, read, and use the "waterpump"
design, that is why it was provided you.
Then, to encypher the text, print out the array from top row to bottom
row, leftmost column to rightmost colum.
In Programmer Speak, we create a Row-Major character matrix, then print it
as a Column-Major character matrix.
Example:
Here's a message: "meetmeinsaintlouis"
It has 17 characters.
We need a square array of char to hold it...but 17 isn't a square number.
What's the next-largest square (bigger than 17?)
2 . 2 = 4
3 . 3 = 9
4 . 4 = 16
5 . 5 = 25 HAH!
25. (And what's the square root of 25? 5 )
So create char matrix[5][5] ;
So write the message into a 5 x 5 square going left to
right/top to bottom:
meetm
einsa
intlo
uisxx
xxxxx
(Note we padded out the extra cells with 'x'. In reality,
we'd use random letters.)
Print it out going top to bottom THEN left to right:
STOP: BE SURE YOU UNDERSTAND THE PRECEEDING SENTENCE. CAN YOU SEE
HOW TO DO IT IN YOUR MIND? If not, keep thinking about it.
Here's the enciphered message:
meiuxeinixentsxtslxxmaexx
input:
Karla: The young woman named Alexandra Borisovna Ostrakhova is your daughter.
OUTPUT:
KonasaoeqauanokurbrnmdvhrnhlgernodwcawdaavaldToABOaurahmlosigbreaertshbzynxirytmo
Tools needed for this Assignment:
std::string
string::length()
string::erase()
string::[]
If there is ANY EXTRANEOUS TEXT in the stream, (LIKE FROM EXTRA PROMPTS
AND WARNINGS FROM YOUR PROGRAM) your code will only produce gibberish.
We're here to build tools for serious workers to use. Please keep
that goal uppermost in your mind, and never add anything unnecessary.
Good machines are simple and solid. Build only good machines.
All contents copyright (C) T.E.H., all rights reserved. None of this
code may be displayed or stored on any public access or private access
system without the written consent of the author. This means any and
all commercial cheating ("Homework Helping/Counselling") services.
Since we're desling with functions() in the text this week, let's break down the
parts fo the program into functions:
int side_length(int length)
{
// call side_length with the length of the message
// it should return you an integer which is the
// correct length of the square array of characters
// to hold the message, plus any padding characters.
}
int randchar(void)
{
//return a random lower-case alphabetic character when called
// note: (((rand() * some multiplier) % 26 )+ 'a') will produce such a character
}
In: Computer Science
HIMT 345
Homework 05: Functions
Overview: Examine PyCharm’s “Introduction to Python” samples for
Functions. Use PyCharm to work along with exercises from Chapter 4.
Modify the grade assignment program of Hwk 04 to utilize a function
by copying the Hwk04 project and creating the Hwk05 project.
Prior Task Completion:
1. Read Chapter 04
2. View Chapter 04’s video notes.
3. As you view the video, work along with each code sample in
PyCharm. The examples used in the video are available for you to
experiment with if you downloaded the complete Severance source
files for Chapters 3-10.
a) With PyCharm open, locate the .zip file entitled Ch 4 Functions
PPT Code Samples.zip.
b) Open each of the project files for that chapter in PyCharm.
Note: The code samples are numbered in the order they are covered
in the video.
c) Start the video and follow along.
4. Complete Exercises 4.1 – 4.5 (not handed in).
Specifics: PyCharm’s “Introduction to Python” project contains
multiple examples giving the basics of conditional expressions (see
list at right). Follow the instructions to complete them. (Not
handed in.)
Use PyCharm to work along with the video solution for Exercise 4.6
from the textbook. Try to make the same mistakes (and fixes) made
by the author. (Not handed in.)
Create a copy of your Hwk04 project file, calling it Hwk05.
1. Highlight the Hwk04 project, select Refactor/Copy.
Important: Do not skip the process of following along with the
videos. It is a very important part of the learning process!
2. Give it a New name: of Hwk05 and leave the To directory: in its
default state.
Leave the “Open copy in editor” box checked.
3. After clicking OK, if the project fails to open, just open it
manually as you would
any project (File | Open | Hwk05 project).
You may immediately delete Hwk04b as it is not needed in this
assignment. You may
need to Refactor | Rename both the project name and the existing
Hwk04a.py file, as
only the directory was renamed by PyCharm in creating the
copy.
Having renamed Hwk04a to Hwk05_YourLastName.py, your task is to
determine the
letter grade using a function.
Here is some pseudocode* to guide the process:
(NOTE: The assign_grade function must be declared at the top of the
Python file.)
Prompt for the test score, using try-except to verify it is
valid
Invoke (call) the function, supplying it the test score and it
returning the appropriate
letter grade;
e.g. letter_grade = assign_grade(test_score)
Display the test score and appropriate letter grade.
What to hand in:
Take screen shots of the console window verifying correct handling
of bad input as well
as letter grades for one test score in each grade range. Copy the
screen shots into a
Word document (filename Hwk05_YourLastName_Screenshots.doc) with
your name and
date in the upper right hand corner. Upload the Word doc and the
Python program file
(Hwk05_YourLastName.py) to the appropriate assignment in the
LMS.
NOTE: As was described in the previous assignment, each Python file
you create should
be documented with (minimally) the following three lines at the top
of each file:
# Filename: Hwk03.py
# Author: <Your Name>
# Date Created: 2016/09/05
# Purpose: <brief description>
(*) pseudocode: a notation resembling a simplified programming
language, used in
program design.
In: Computer Science
In lab you are going to be using drosophila flies with sepia mutations (SE, se) causing brown eyes found on chromosome 3 and apterous mutation (AP, ap) on chromosome 2 causing loss of wings. These are recessive mutations. Red eye is the wild-type phenotype. Assuming you have a female heterozygous at both loci. Draw the chromosomes as they go through meiosis (Make sure you show somatic cell, prophase I, metaphase I, metaphase II, gametes.) Draw all possible gametes. What percentage of each phenotype do you expect? What are all the possible phenotypes and genotypes would you expect? This female mates with a male that is also heterozygous at both loci and they have 1000 progeny.
1. What are all possible phenotypes you could recover?
A. Red eyes and wings OR Red eyes and no wings
B. Red eyes and wings OR Brown eyes and no wings
C. Red eyes and wings OR Brown eyes and wings
D. Red eyes and wings OR Brown eyes and wings OR Red eyes and no wings
E. Red eyes and wings OR Brown eyes and wings OR Red eyes and no wings OR Brown eyes AND no wings
2. What combination of phenotypes is displayed the most?
A. Red eyes and wings
B. Red eyes and no wings
C. Brown eyes and wings
D. Brown eyes and no wings
3. Out of 1000 progeny how many animals would have the most common combination of phenotypes?
Numeric Answer:
4. What combination of phenotypes is displayed the least?
A. Red eyes and wings
B. Red eyes and no wings
C. Brown eyes and wings
D. Brown eyes and no wings
5. Out of 1000 progeny how many animals would have the least common combination of phenotypes?
Numeric Answer:
6. What is the least probable genotype?
A. SE/se; AP/ap
B. se/se; ap/ap
C. SE/SE; AP/AP
D. SE/se; AP/AP
E. SE/se; ap/ap
7. What is the second least probable genotype?
A. SE/se; AP/ap
B. se/se; ap/ap
C. SE/SE; AP/AP
D. SE/se; AP/AP
E. SE/se; ap/ap
8. What percent of progeny will have the most common genotype?
A. 6.25
B. 12.5
C. 18.75
D. 25
E. None of the Above
9. You find a Red eye fly with wings. What is the probability this fly is homozygous SE/SE?
Word Answer:
10. You find a Red eye fly with wings. What animal could you cross this animal to, in order determine if its homozygous or heterozygous at the SE locus.
A. A Red eyed fly with wings
B. A Red eye fly with or without wings
C. A heterozygous Red eye fly with or without wings
D. A homozygous Red eye fly with or without wings
E. A brown eye fly with or without wings
11. What is the probability that this fly in male?
Word Answer:
In: Biology
Rules for this Assignment:
There are 2 classes required for this project:
Separation of code will be paramount in order to produce a proper and legible file. This will require that you analyse the problem and separate it into multiple tasks. Each task should then be represented by its own function.
The methods you define in the EncryptionProcedures class should be static.
Files to submit
In a properly developed project, all your code should be located in 2 java files, Encryption.java and EncryptionProcedures.java. You will need to submit those 2 files.
Additionally, a WORD document should also be submitted. In this document, you will explain the validity or invalidity of defining the methods in the EncryptionProcedures class as static. (minimum explanation, 5 lines)
Project Description
The goal of the project is to be able to retrieve an input from the console, encrypt it according to specifications that will be described below, and display the result.
The user input can be a single word, or an entire sentence (on a single line).
Specifications
private static final String[] arrPeriodicTableValues = {"h", "he", "li", "be", "b", "c", "n", "o", "f", "ne", "na", "mg", "al", "si", "p", "s", "cl", "ar", "k", "ca", "sc", "ti", "v", "cr", "mn", "fe", "co", "ni", "cu", "zn", "ga", "ge", "as", "se", "br", "kr", "rb", "sr", "y", "zr", "nb", "mo", "tc", "ru", "rh", "pd", "ag", "cd", "in", "sn", "sb", "te", "i", "xe", "cs", "ba", "la", "ce", "pr", "nd", "pm", "sm", "eu", "gd", "tb", "dy", "ho", "er", "tm", "yb", "lu", "hf", "ta", "w", "re", "os", "ir", "pt", "au", "hg", "tl", "pb", "bi", "po", "at", "rn", "fr", "ra", "ac", "th", "pa", "u", "np", "pu", "am", "cm", "bk", "cf", "es", "fm", "md", "no", "lr", "rf", "db", "sg", "bh", "hs", "mt", "ds", "rg", "cn", "nh", "fl", "mc", "lv", "ts", "og"};
The preceding code represents all the elements of the periodic table in the form of an Array. The index of each element can be used to reference its atomic number. This instruction can be included in your code for use in this assignment.
The encryption procedure will be a specific 1 and follow a strict set of rules in order to be properly implemented. The primary method will be called periodicEncrypt.
Here is the overall description of the procedure to follow in order to accomplish a proper encryption in this case:
In: Computer Science
Part 1: In each of the following scenarios, tell whether there is a violation of confidentiality, integrity, or availability, or some combination of the three. In addition, for each item, write a two- or three-sentence paragraph explaining why your answer is correct.
Alex disables Barbara's router by logging in remotely with the manufacturer's default password.
Mallory builds a WiFi jammer using plans she found on the Internet and jams wireless signals over a large part of her apartment building.
Charlene uses a key logger to capture Darla's banking password.
Eve rewrites the magetic stripe on a gift card to change the amount from $10 to $100.
(Adapted from an exercise in Bishop, Matt, Introduction to Computer Security.)
Part 2: Distinguish among vulnerability, exploit, threat, risk, and control mechanism (called "countermeasure" in chapter one of the text) in five brief paragraphs. If you do any research outside the textbook, which you are encouraged to do, be sure to cite your sources. You can see how to do that in An Example of Proper Writing in the "Required Reading" section.
Part 3: Using the tool at http://www.fileformat.info/tool/hash.htm, compute the SHA-256 checksum of the MS-Word file that is your work on this assignment so far, or some similar file if you don't have that one available. Copy the calculated cryptographic hash into Windows Notepad or word processing document to save it temporarily. Now change one character from a capital to a lowercase letter or vice-versa in the original document, re-save, and recompute the the cryptographic hash. Paste the old and new cryptographic hashes into your homework document. Be sure to identify which one is before and which is after.
Using the information from the textbook, explain at least two uses for a cryptographic hash, and explain how the experiment you just performed confirms those uses.
Do some research and explain in a paragraph or so what a "hash collision" is. Be sure to cite your research.
Part 4: Explain in a couple of paragraphs how public key encryption can be used to implement a digital signature. Be sure you are very clear on when a private key is used and when a public key is used.
Part 5: Generally, a digital signature involves encrypting a cryptographic hash, or digest, generated from the message. Explain why we do we not encrypt the message itself. You can answer this question in one sentence.
Part 6: For each of the following scenarios below, tell what type of encryption is most appropriate and in a sentence or two explain the reasoning for your choice.
Alice wants to send a confidential message to Bill, whom she has never met and who lives in a distant country.
Charlie wants to be sure that no one but he can see the financial and medical records he has stored on his computer.
David needs a way to check that large computer files stored on corporate servers have not been modified.
Eddard uses a "cloud" backup service; he wants to be sure the operators of the service cannot read his files.
Frank needs to send a message to George. The message need not be confidential, but George must be assured that it actually came from Frank.
In: Computer Science